[ Mihailo @ 13.11.2002. 02:45 ] @
Security researchers have discovered several serious new vulnerabilities in the BIND software that runs on the vast majority of the Internet's DNS servers. The most serious flaw, a buffer overrun in both BIND 4 and BIND 8, enables an attacker to execute arbitrary code on a vulnerable server.

http://www.eweek.com/article2/0,3959,696200,00.asp
[ BORG @ 13.11.2002. 12:07 ] @
Trenutna stabilna verzija istog je 9.2.1
[ stinger @ 13.11.2002. 12:38 ] @

Netacno... (u vezi borg-ovog posta za bind 9.2.1)


BIND 9 Release Candidate
BIND Version 9.2.2rc1 (Released August 14, 2002)
BIND 9.2.2rc1 is a release candidate for BIND 9.2.2. It fixes a number of bugs in 9.2.1.
[ BORG @ 13.11.2002. 15:20 ] @
Sorry ... sa isc.org sam i citao ...
Samo sam izgleda zurio pa nisam ni obracao paznju ...
[ stinger @ 13.11.2002. 16:34 ] @
opusteno... bind suxx big time nazalost.. :(
[ stinger @ 13.11.2002. 17:17 ] @
ja zaboravih, temp (a mozda i perm) resenje je da disable-ujete recursive query... (naravno podesite ispravne ip adrese. Zacinite po ukusu uz neki log channel ....


// Specifies which hosts are allowed to make recursive queries
// through this server. If not specified, the default is to allow recursive
// queries from all hosts.
//
allow-recursion {
10.1.0.0/24;
10.2.0.0/24;
};
[ B o j a n @ 13.11.2002. 19:54 ] @
Hehe, a BIND drustvance se kunulo da je devetka pisana ispocetka L;))

... sompe people will never learn l;)